Protocol and applications for sharing quantum private keys

Han Wei Wang*, Tien Sheng Lin, I. Ming Tsafi, Sy Yen Kuo

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

Transmitting message in secret is getting more and more important nowadays. In the classical world, the message we sent run the risk of being intercepted by an attacker. As a result, we have to encrypt the message, or send it using a private channel. However, if we transmit messages via such methods, there are still some ways to decipher the information. For example, a powerful computer can be used to decrypt the message or try to steal the message from the private channel. In quantum cryptography, entanglement can be used as a secure channel to transmit information with absolute secrecy. From this perspective, quantum entanglement pairs are equivalent to a quantum private key. However, like the classical key distribution problem, the entanglement has to be shared before it can be used. In this paper, we propose a protocol that can be used to distribute such entanglement pairs securely, so they can be subsequently used to transmit messages with perfect security. The security of this protocol is based on the laws of nature, instead of unproven mathematical hard problems.

Original languageEnglish
Title of host publication39th Annual 2005 International Carnahan Conference on Security Technology, CCST'05
StatePublished - 2005
Externally publishedYes
Event39th Annual 2005 International Carnahan Conference on Security Technology, CCST'05 - Las Palmos, Spain
Duration: 11 10 200514 10 2005

Publication series

NameProceedings - International Carnahan Conference on Security Technology
ISSN (Print)1071-6572

Conference

Conference39th Annual 2005 International Carnahan Conference on Security Technology, CCST'05
Country/TerritorySpain
CityLas Palmos
Period11/10/0514/10/05

Fingerprint

Dive into the research topics of 'Protocol and applications for sharing quantum private keys'. Together they form a unique fingerprint.

Cite this